Showing 1 - 10 of 24,029
Wir sind abhängig vom Internet. Der Strom aus der Steckdose, das Geld aus dem Automaten, die Bahn zur Arbeit, all das …
Persistent link: https://www.econbiz.de/10011844247
Persistent link: https://www.econbiz.de/10014436485
Veremos primeramente los antecedentes del internet, como empezaron, desde que tiempo ya se hizo comercializo en la web …
Persistent link: https://www.econbiz.de/10010583300
Persistent link: https://www.econbiz.de/10011488360
The flexibility and openness of mobile ad hoc networks (MANETs) make them attractive for various types of applications such as military communication, emergency search and rescue operations, disaster recovery, battlefields, communication between moving vehicles (VANET etc. However, MANETs are...
Persistent link: https://www.econbiz.de/10012045152
In this paper, the authors will propose a meta-heuristic for intrusion detection system by scenario, inspired from the protection system of social bees to their hive. This approach is based on a specialized multi agent system where the authors will give a limited responsibility to each guard bee...
Persistent link: https://www.econbiz.de/10012045686
Day by day network security is becoming more challenging task. Intrusion detection systems (IDSs) are one of the methods used to monitor the network activities. Data mining algorithms play a major role in the field of IDS. NSL-KDD'99 dataset is used to study the network traffic pattern which...
Persistent link: https://www.econbiz.de/10012046727
which will be helpful to mitigate the malware attacks and secure LAMP server. Experimental analysis has been done to …
Persistent link: https://www.econbiz.de/10012046989
Resource allocation decisions can be enhanced by performing risk assessment during the early development phase. In order to improve and maintain the security of the Information System (IS, hereafter), there is need to build risk analysis model that can dynamically analyze threat data collected...
Persistent link: https://www.econbiz.de/10012048074
Security in mobile wireless sensor networks is a big challenge because it adds more complexity to the network in addition to the problems of mobility and the limited sensor node resources. Even with authentication and encryption mechanisms, an attacker can compromise nodes and get all the keying...
Persistent link: https://www.econbiz.de/10012048265